You are on page 1of 9

Aggression and Violent Behavior 50 (2020) 101343

Contents lists available at ScienceDirect

Aggression and Violent Behavior


journal homepage: www.elsevier.com/locate/aggviobeh

Cyberbullying: Concepts, theories, and correlates informing evidence-based T


best practices for prevention

Nadia S. Ansary
Rider University, United States of America

A R T I C LE I N FO A B S T R A C T

Keywords: Emerging evidence has revealed that many characteristics of cyberbullying—its definition, prevalence rates, risk
Cyberbullying and protective factors, outcomes, and prevention strategies—are related and yet somewhat unique from tradi-
Cybervictimization tional bullying. The ubiquity of technology in the lives of youth presents an opportunity for individuals to
Electronic bullying intentionally and repetitively harm others, 24 h per day, sometimes with complete anonymity, and often without
Prevention
consequence. This is concerning given the high rates of psychopathology associated with cybervictimization,
Intervention
over and above, traditional bullying. Given the current state of the field, this literature review provides a critical
synthesis of the extant knowledge concerning (1) a definition of cyberbullying; (2) theories explaining cyber-
bullying; (3) prevalence rates; (4) a brief developmentally-focused overview of adolescents and their online use;
(5) risk and protective factors; (6) negative psycho-social outcomes, over and above traditional bullying; and (7)
a brief overview of prevention and intervention programming with information for key stakeholders.
Implications and future directions are discussed.

While some researchers view cyberbullying as not profoundly dis- believe that social media is the reason for greater bullying and rumor
tinct from traditional bullying (Olweus & Limber, 2018; see spreading (Anderson & Jiang, 2018). Second, mounting evidence exists
Vaillancourt, Faris, & Mishna, 2017), the nuanced differences between on the long-term negative outcomes uniquely associated with cyber-
the two suggest that generalizing findings from traditional bullying to bullying (Fahy et al., 2016; Vaillancourt et al., 2017) which is parti-
cyberbullying may be inadequate (Savage & Tokunaga, 2017). Growing cularly troubling in light of the fact that roughly one in five adolescents
evidence reveals that many facets of cyberbullying—from its definition, experience it (Hinduja & Patchin, n.d.; Selkie, Fales, & Moreno, 2016).
prevalence rates, risk and protective factors, outcomes, and prevention Vaillancourt et al. (2017) highlight that over and above traditional
strategies—are related and yet somewhat distinct from traditional bullying, cyberbullying is uniquely associated with (a) somatic diffi-
bullying (Espelage & Hong, 2017; Kowalski, Limber, & McCord, 2019; culties (e.g., headaches, stomach aches, etc.); (b) depression; (c) sui-
Patchin & Hinduja, 2012; Smith et al., 2008; Vaillancourt et al., 2017; cidal ideation and suicide attempts; (d) symptoms of Post-Traumatic
Zych, Farrington, & Ttofi, 2019). Cyberspace makes bullying easier, Stress Disorder (PTSD); and (e) academic difficulties, among others.
more accessible, and inflicts greater harm than traditional bullying (see Given the current state of the field, this literature review provides a
Vaillancourt et al., 2017 for a review). critical synthesis of the extant knowledge concerning (1) a definition of
Cumulatively, these factors suggest that cyberbullying may be more cyberbullying; (2) theories explaining cyberbullying; (3) prevalence
complex and more insidious than traditional bullying. And yet, the rates; (4) a brief developmentally-focused overview of adolescents and
cyberbullying literature is still nascent with advancements in theory their online use; (5) risk and protective factors; (6) outcomes, over and
and empirical evidence required to fuel developments in prevention above traditional bullying; and (7) a brief overview of prevention and
and intervention programming. A call-to-action is necessary given intervention programming with information for key stakeholders. In
several factors. First, findings from the Pew Research Center suggest order to conduct this review, a literature search of the most current
that 95% of teens own or have access to a smartphone and 45% of teens scholarship published in peer-reviewed outlets from 2010 and beyond
surveyed report being “online on a near-constant basis” (Anderson & was conducted. Keyword searches included cyberbullying, cybervictimi-
Jiang, 2018). Twenty-four percent of youth surveyed by Pew felt that zation, electronic bullying, online bullying, and technology and bullying.
social media had a negative impact on their lives; 27% of these youth Only English language publications were used. Reports from large-scale


Corresponding author at: Rider University, Department of Psychology, 2083 Lawrenceville Road, Lawrenceville, New Jersey 08648-3099, United States of
America.
E-mail address: nansary@rider.edu.

https://doi.org/10.1016/j.avb.2019.101343
Received 9 October 2018; Received in revised form 9 September 2019; Accepted 15 October 2019
Available online 01 November 2019
1359-1789/ © 2019 Published by Elsevier Ltd.
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

studies by government agencies and evidence-based advocacy groups age of participants (since cyberbullying during elementary school is
were also included. Furthermore, this review mainly focuses on ado- generally low but increases in adolescence; see Kowalski et al., 2019);
lescents who are defined “as individuals in the 10–19 years age group” (3) whether a single item or multiple items were used (with multiple
(World Health Organization [WHO], 2013). Consistent with that defi- item measures showing higher validity); and (4) cross-country com-
nition, in this paper the term adolescent generally refers to middle- to parisons where there may be differences in the availability of tech-
high-school-aged individuals who are distinct from college-aged sam- nology (Kowalski et al., 2019; Whittaker & Kowalski, 2015).
ples. In an important contribution to the field, Peter and Petermann
In terms of the framework guiding this literature synthesis, devel- (2018) distilled the essential elements of existing cyberbullying defi-
opmental psychopathology provides a research-to-application con- nitions in their concept analysis of articles published since 2010. Their
tinuum which is most useful in addressing this problem. Briefly, as a findings led to the following definition of cyberbullying as “using in-
discipline, developmental psychopathology explores the intersection of formation and communication technologies (ICT) to repeatedly and
human development (e.g., exploring change that recognizes the in- intentionally harm, harass, hurt and/or embarrass a target” (p. 359).
dividual as an active agent in his or her development) and clinical This definition is not significantly different than earlier forms which are
psychology (e.g., concerned with the diagnosis and treatment of dis- most often cited in the literature: Smith et al. (2008) define cyberbul-
ordered behavior) with a specific focus on using research to inform lying as “an aggressive, intentional act carried out by a group or in-
prevention strategies (Hinshaw, 2013). Many scholars recognize that dividual, using electronic forms of contact, repeatedly and over time
developmentally-focused social-ecological frameworks that view bul- against a victim who cannot easily defend him or herself” (p. 376); and
lying as a dynamic process involving many levels of influence (e.g., Hinduja and Patchin (n.d.) define it as “… when someone repeatedly
family, school, neighborhood) are most useful in explaining bullying and intentionally harasses, mistreats, or makes fun of another person
(Swearer & Hymel, 2015; Zych et al., 2019). Furthermore, recent evi- online or while using cell phones or other electronic devices”. Cumu-
dence parsing risk and protective factors uniquely associated with cy- latively, these nearly identical definitions reveal that a consensus has
berbullying are also helpful in conceptualizing the issue within a de- developed.
velopmental psychopathology framework (Kowalski et al., 2019; Zych
et al., 2019). To date, no literature exists examining cyberbullying 2. Theoretical models
through this lens, leaving a void in the scholarship and evidence-based
recommendations for best practices to address cyberbullying. Similar to the lack of agreement about a cyberbullying definition,
there is no consensus about a comprehensive theoretical model that
1. Operational definition explains cyberbullying. The largely a-theoretical state of the cyberbul-
lying literature has provided a barrier to a holistic understanding of the
Failure to have a consensus about a definition is not a trivial pro- issue (Kowalski, Giumetti, Schroeder, & Lattanner, 2014). Only one
blem. It is especially noteworthy that many researchers vary in how theoretical model, to date—the Barlett and Gentile cyberbullying model
they operationally define cyberbullying and this necessarily has im- (BGCM, Barlett, 2017)—explicitly examines cyberbullying perpetra-
plications for the rigor of its study and for prevention programming. tion. Most scholars examining cyberbullying have adapted models of
How can adequate cyberbullying prevention strategies be effectively aggression, such as the general aggression model (Anderson &
designed when the definition and scope of the problem remain a Bushman, 2002; see Barlett, 2017; Savage & Tokunaga, 2017), and I3 (I-
moving target? cubed) theory (Slotter & Finkel, 2011; see Wong, Cheung, & Xiao,
There are two characteristics of cyberspace that present challenges 2018). Beyond explicit aggression models, the social-ecological dia-
to the existing definition of traditional bullying which requires: an in- thesis-stress model has been used to explain bullying (Swearer and
tent to harm, a power imbalance, and repetition of the harmful beha- Hymel, 2015) and likely has great utility in explaining cyberbullying.
vior (Olweus, 1999). First, many have argued that the power imbalance Each of these models will be briefly evaluated.
criteria—either with regard to physical or social power required in the The Barlett and Gentile cyberbullying model (BGCM, Barlett, 2017)
traditional bullying definition—is less explicit in the online context. accounts for (1) anonymity in cyberspace; (2) the recognition that one's
Cyberspace inherently contributes to a power imbalance: the disin- physical size does not contribute to a power imbalance online; and (3)
hibition effect affords online users opportunities to behave more bra- both of these mediate positive attitudes towards bullying, ultimately
zenly (Suler, 2004), and to attack with anonymity (Hinduja & Patchin, predicting to cyberbullying perpetration. While the model has been
2015a; see also Peter & Petermann, 2018). Another contributor to the supported in examinations by its creators (Barlett, 2017; Barlett,
power imbalance is the fact that a single malicious act may be re- Madison, Heath, & DeWitt, 2019), there are several issues with its
peatedly disseminated and viewed by multiple users: This also negates usefulness. First, the theory is too simplistic given that it ignores prior
the intentional repetition criteria within the traditional bullying defi- victimization as a catalyst for online perpetration of bullying which has
nition (Hinduja & Patchin, 2015a; see also Peter & Petermann, 2018). been found to be a significant correlate of cyberbullying (Kowalski
Some researchers have attempted to sidestep this dilemma by et al., 2014; Kowalski et al., 2019; Waasdorp & Bradshaw, 2015; see
simply using global measures of cyberaggression (i.e., asking about also Wong et al., 2018). Second, person-specific factors (e.g., self-con-
cybervictimization without any inquiry about repetition) as indicators trol, moral disengagement, use of technology, etc.) and context-specific
of cyberbullying (Kowalski et al., 2019; Peter & Petermann, 2018). The factors (e.g., parental factors including monitoring of technology,
implications of this are two-fold: operationalizing cyberbullying as sy- schools failing to have explicit policies on consequences for cyber-
nonymous with cyberaggression has compromised the internal validity attacks, etc.) that have been found to be uniquely associated with cy-
of those studies, and it has also obfuscated a clear understanding of berbullying perpetration (Kowalski et al., 2019; Zych et al., 2019), are
prevalence rates. For example, in their review of the literature, Hinduja not represented in the model. Third, the operational definition of the
and Patchin (n.d.) found victimization rates that ranged from 0.4% to construct belief in the irrelevance of muscularity during online bullying (Bi-
92% and offending values ranged from 1.0% to 60.4%. Similarly, vast MOB) has several issues, namely, (a) it is ambiguous, (b) careful con-
prevalence rates have been reported in other large-scale reviews of the sideration of the items reveals they not only assess the belief that ‘size
cyberbullying literature (Kowalski et al., 2019; Selkie et al., 2016). does not matter’ online but concurrently assess the individual's positive
Beyond failure to make a distinction between cyberaggression and cy- attitudes towards cyberbullying which is another unique predictor in
berbullying, other reasons for this vast range of prevalence rates in- the model, and (c) the scale has shown varied reliability with reported
clude (1) the time parameter used in measurement (i.e., how many alpha levels ranging from as low as 0.52 to greater than 0.69 (Barlett
times has this happened in the last 30 days or in the last year?, etc.); (2) et al., 2019). Most importantly, the model has been examined only with

2
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

adult samples ages 19–74 (Barlett et al., 2019), solely uses online data 3. Prevalence
collection procedures, and has been empirically examined only by its
creators. A common yet concerning issue in the cyberbullying literature is the
Other models that have shown some utility in explaining cyber- wide range of prevalence rates. This variability has been largely due to
bullying are based on adapted versions of the generalized aggression discrepancies in operationally defining and measuring cyberbullying in
model (Anderson & Bushman, 2002) which examines person-specific a way that discriminates it from cyberaggression. Nonetheless, large
factors (e.g., demographic variables, personality, etc.) in confluence scale studies and reviews place the average annual cybervictimization
with situation-specific factors (e.g., presence of bystanders, school cli- rates between 14%–21%. The U.S. Department of Health and Human
mate, etc.) (Kowalski et al., 2014; Savage & Tokunaga, 2017). In ap- Services, Centers for Disease Control report that 14.9% of high
plying this model, Savage and Tokunaga (2017) found that rather than schoolers reported being cyberbullied in the last year (Kann, McManus,
a direct relationship between person-specific predictors and cyberbul- Harris, & et al., 2018). Hinduja and Patchin (n.d.) conducted an ex-
lying as an outcome, the relationship is much more complex and dy- tensive review of the literature (evaluating over 234 scholarly pub-
namic. In that study, high cyberbullying perpetration was demonstrated lications) and found a wide range of rates with the average lifetime
among two sets of individuals (1) ones who were rated high on internet incidence rate of cybervictimization at 21% and 13% for cyberbullying
self-efficacy, low on verbal aggressiveness, and high on social skills; and perpetration. These values are generally consistent with other data on
(2) ones who were rated high on internet self-efficacy, high on verbal the incidence of cyberbullying (Kowalski et al., 2019; Olweus & Limber,
aggressiveness, and low on social skills. These interactions suggest that 2018; Selkie et al., 2016).
a confluence of many factors is at play in explaining cyberbullying since
no one factor universally predicted to the outcome. Moreover, the 4. Adolescents and apps
findings suggest that extension of traditional bullying models to explain
cyberbullying are inadequate (Savage & Tokunaga, 2017). The pace of emerging technology that draws in a young population
I3 (I-cubed) theory (Slotter & Finkel, 2011), developed to explicate of users creates challenges for the scholarly study of cyberbullying.
intimate partner violence, has been adapted by Wong et al. (2018) to Social media applications (Apps) create increasingly sophisticated yet
examine cyberbullying perpetration. I3 theory examines pre- easy-to-use modalities for youth to connect to one another in both
dictors—both at the individual and situational level of—instigation (i.e., helpful and harmful ways. Suicides of young adolescents as a result of
factors that provoke aggression), impellance (i.e., factors that promote cyberbullying have fueled a more urgent dialogue concerning the role
cyberbullying), and inhibition (factors that reduce the likelihood of cy- of social media Apps–such as Ask.fm and Kik–in cyberbullying (Smith-
berbullying perpetration). While the model demonstrated explanatory Spark, 2013; Wallace, 2015). These—as well as other free Apps such as
power, it requires replication with younger samples in the West since Voxer, Whisper, Wut, Rumr—allow users to anonymously post photos
the sample under investigation was Hong Kong undergraduates (Wong or messages that can be viewed for a short time online. Others like
et al., 2018). Furthermore, the authors use a broader definition of cy- Snapchat allow users to post publicly or privately to subsets of friends.
beraggression (e.g., receiving messages that are harmful but with no Likewise, fake accounts on Facebook, Instagram, and Twitter also afford
indication as to whether these happened repeatedly or not) and thus the opportunity to anonymously engage in cyberbullying perpetration.
replication with a more stringent measurement of cyberbullying is ne- Although, most social media platforms require a minimum user age of
cessary. 13, many Apps are used by younger youth (see Valencia, 2014).
In contrast to these models of aggression, Swearer and Hymel's Emerging evidence suggests that there are age differences in the
(2015) social-ecological diathesis-stress model provides a complex ways that individuals engage social media to cyberbully. For elemen-
framework that recognizes the dynamic interplay of genetics, social, tary school-aged youth, online gaming (which affords users the ability
and environmental factors in explaining bullying perpetration. The to converse via headset as well as in-game text) has been identified as
model accounts for how various settings (e.g., family, school, neigh- the most widespread way to engage in cyberbullying (see Kowalski
borhood) in a child's life can interact with the child's genetic vulner- et al., 2019). Among adolescents, cyberbullying most commonly occurs
abilities (e.g., temperament, personality, etc.), and individual risk and via social media (Kowalski et al., 2019) with one study identifying
protective factors to explain bullying involvement. Importantly, from a Twitter and Facebook as the most commonly used social media plat-
developmental psychopathology framework, the model accounts for a forms to do so (Whittaker & Kowalski, 2015). Within a small young
dynamic interplay of genetic vulnerability, environmental stressors, adult sample, both public and private comments, status updates, and
and the norms of environmental contexts such as school, in explaining posts, were the most common ways of engaging in cyberbullying (Brody
involvement in bullying. Because of its complexity, the social-ecological & Vangelisti, 2017).
diathesis-stress model provides a way to integrate the empirical evi- School-aged social media users are an at-risk population for cyber-
dence on the issue in a holistic model. Although the model was pro- bullying involvement. First, school-aged youth have nascent emotional
posed specifically for traditional bullying, it has power when con- and cognitive regulatory systems in the brain, which govern behavior.
sidering cyberbullying. Consider the following factors, all represented More specifically, the prefrontal cortex of the brain—which administers
in this explanatory model, (a) a child's propensity to aggress (e.g., ge- impulse control, judgment, and thinking through anticipated con-
netic vulnerability, moral disengagement; etc.); (b) prior experiences sequences of one's behavior—does not conclude development until
with being bullied (environmental stressors); (c) moderating factors young adulthood (Pharo, Sim, Graham, Gross, & Hayne, 2011). Second,
related to cyberspace (e.g., strength of the disinhibition effect and one's some features of cyberspace—anonymity, ubiquity of technology, and
technological efficacy); and (d) parental factors (e.g., parent-child re- short time-duration of posts—afford opportunities for youth with an
lationships and monitoring of technology which are context-specific intention to harm others to do so with deleterious consequences for the
factors). target (Peter & Petermann, 2018; Wong et al., 2018; Zych et al., 2019).
While the models noted here possess strengths in explaining cy- To illustrate, the individual who bullies may be a complete stranger or
berbullying perpetration, many require modification to sufficiently someone the target knows who is posting anonymously (or alternatively
capture its complexity. Adequate representation of personal, familial, using an alias or different identity) which can contribute to the target
school, peer, and neighborhood/community contexts, as well as the feeling helpless. Moreover, the attacks may be occurring privately or
most current set of risk and protective factors examined in the literature publicly and the target may receive posts that are viewable for an ex-
are lacking in the extant models. Accordingly, incorporating all of these tremely short time (just a few seconds) or for much longer periods of
elements is critical in the refinement of existing models and in the time as well as re-posted easily. Thus, cyberbullying incidents can be
development of new ones. privy to a potentially large online audience of peers and strangers

3
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

leaving targets unsure of who has “seen” the incident (e.g., photo, ob- differences, girls appear to be at greater risk (Kann et al., 2018;
scene posting, etc.). Third, the frequency of cyberbullying intervention Kowalski et al., 2019), and this will be addressed in more detail in the
is quite low: Adults are not typically present online and evidence sug- next section. Explorations into ethnic and racial differences in cyber-
gests that nearly 91% of bystanders report that they did nothing when victimization have yielded mixed-results (Kowalski et al., 2019),
they witnessed such an attack (Lenhart et al., 2011). Fourth, reporting though some evidence suggests that whites experience cybervictimi-
of cyberbullying incidence is very low since targets may fear parents zation at higher rates compared to their black and Hispanic counter-
revoking their access to technology in order to protect them from fur- parts (Kann et al., 2018). Additionally, there is some evidence that
ther abuse. The confluence of low adult supervision, the perception that Arab-Americans may be distinctly targeted in cyberbullying (Kowalski
cyberbullying will not be reported, low bystander intervention, and the et al., 2019). Other forms of bias-based bullying are supported in the
lack of repercussions for such behavior are all potent contributors to literature in that the LGBTQI community, those with disabilities, and
cyberbullying perpetration (Kowalski et al., 2019; Zych et al., 2019). individuals with elevated weight status have also been identified as at-
Cumulatively, the factors presented in this section provide the risk (Kowalski et al., 2019). The Youth Behavior Risk Surveillance from
backdrop for cyberbullying involvement. The convergence of these the Centers for Disease Control found that LGBTQI youth reported cy-
factors sets the stage for targets experiencing helplessness, psycholo- bervictimization rates over twice as high as those reported by their
gical distress, as well as fear that there is no safe place online (Dehue, heterosexual counterparts (27.1% and 13.3% respectively) (Kann et al.,
2013; Vandebosch & Van Cleemput, 2009). From this perspective, it is 2018). Absent from the literature is any mention of religious minorities.
clear why cyberbullying involvement is associated with long-term Factors predictive of cyberbullying perpetration have also been
psycho-social dysfunction, above and beyond the effects seen for tra- documented in the literature. For cyberbullying perpetration, in-
ditional bullying. dividual-level risk factors include: low self-esteem, empathy, self-con-
trol, and high levels of impulsivity, moral disengagement, anxiety, ag-
5. Risk and protective factors gression, and traditional bullying victimization (Kowalski et al., 2019).
Alternatively, high self-esteem, social competence, and emotional
Recent years have seen an increase in the identification of risk and management have been identified as protective factors (Kowalski et al.,
protective factors of cyberbullying, and of course, many of these are 2019; Zych et al., 2019). High technology use has been identified as an
shared with traditional bullying. Two reviews on this issue, Kowalski individual-level risk factor for cyberbullying perpetration (Kowalski
et al. (2019) and Zych et al. (2019), are particularly rigorous in their et al., 2019), and low use has been identified as a protective factor
focus on the unique risk and protective factors of cyberbullying. The (Zych et al., 2019). With regard to the family realm, a positive parent
realms of risk and protective factors identified in those reviews relate to relationship and home environment have been found to be protective
the domains seen in Swearer & Hymel's social-ecological diathesis-stress (Kowalski et al., 2019; Zych et al., 2019), and parental supervision of
model (Swearer and Hymel, 2015), namely, individual, family, peer, technology has also been identified as a protective factor (Zych et al.,
school, and community. Before proceeding through the list of risk and 2019). Regarding the peer domain, positive peer interactions as well as
protective factors, it is important to point out that in a review of meta- peer support have been identified as protective factors (Kowalski et al.,
analyses considering protective factors on this issue (Zych et al., 2019), 2019; Zych et al., 2019). Conversely, peer rejection, lack of prosocial
the protective factors for cybervictimization with the strongest effect peers and peer norms supporting bullying have been identified as risks
size were those at the individual level related to personal competencies (Kowalski et al., 2019). School and community factors including a po-
and low technology use, while for cyberbullying perpetration, the sitive school climate and satisfaction with school have found to be
strongest protective effects were found for low technology use and peer- protective against cyberbullying perpetration (Kowalski et al., 2019;
level factors. It is also critical to note that no prospective longitudinal Zych et al., 2019). With regard to group differences, the evidence on
studies have been conducted to identify risk and protective factors of gender differences and race and ethnic disparities in cyberbullying is
cyberbullying, and existing findings are mainly garnered from cross- mixed (Kowalski et al., 2019).
sectional designs (Zych et al., 2019). There is substantial overlap in the risk and protective factors for
For cyberbullying victimization, individual-level risk factors in- both victims and perpetrators of cyberbullying. This is likely due to the
clude: low self-esteem, self-control, social intelligence, low empathy, most vulnerable group of youth who are both targets of bullying and
high levels of anxiety, aggression, moral disengagement, and being a perpetrators of it—bully-victims. More work is necessary to better un-
victim of traditional bullying victimization (Kowalski et al., 2019). derstand this vulnerable group in order to design more effective pro-
Stress and suicidal ideation have also been identified as risks for cy- gramming to address their needs.
bervictimization (Kowalski et al., 2014). Protective factors of cyber-
bullying victimization include high self-esteem (Kowalski et al., 2019) 5.1. Gender differences
as well as high levels of emotional management, self-concept, and social
competence (Zych et al., 2019). With regard to technology use, low Mixed evidence exists about gender differences in cyberbullying
levels have been found to be protective (Zych et al., 2019) while high though a preponderance of evidence points to females being at greater
levels are a risk (Kowalski et al., 2019). In the parenting domain, risks risk of involvement (Kann et al., 2018; Kowalski et al., 2019). In point
include a single-family household, negative family environment, and of fact, the most current results of the Youth Behavior Risk Surveillance
sexual abuse (Kowalski et al., 2019), while protective factors consist of from the Centers for Disease Control indicate that females reported
parental support and warmth (Kowalski et al., 2019) and high socio- nearly twice as high cybervictimization as males (19.7% and 9.9% re-
economic status (Zych et al., 2019). Just as low peer support has been spectively) (Kann et al., 2018). Other studies suggest no gender dif-
identified as a risk for cybervictimization (Kowalski et al., 2019), high ferences (see Wong et al., 2018 for a brief review).
peer support and positive peer interactions have been identified as a Such inconsistencies in the literature point to the likelihood that
protective influence (Zych et al., 2019). School and community factors that there are more nuanced differences in the ways that males and
also play a role in that school climate, safety, satisfaction with school, females relate online and how each group interacts in cyberbullying
and a safe neighborhood have been identified in these two reviews as situations. According to Wong et al. (2018), males in their study were
protective factors against cyberbullying victimization (Kowalski et al., more likely to engage in cyberbullying perpetration if they had been
2019; Zych et al., 2019). previously victimized, whereas for females, they were more motivated
Regarding group differences, there is an emerging trend in terms of by the disinhibition effect. These gender differences imply that males
gender differences and there is largely mixed evidence when con- and females engage in cyberaggression for different reasons in cyber-
sidering disparities by race and ethnicity. With respect to gender space: males possibly using it to seek revenge while females may feel

4
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

emboldened in situations where their accountability is diminished on- been developed, it is important to discuss the findings of the only
line. The motivation for males to seek revenge for prior cyberbullying published cyberbullying program reviews to date (1) Van Cleemput
concurs with the overrepresentation of males in the cyberbully-victim et al. (2014) reviewed eight programs across nine countries and con-
category found in other studies (Fahy et al., 2016). ducted a meta-analysis; (2) Tanrikulu (2018) reviewed seventeen pro-
Beyond gender differences in motivations for cyberbullying perpe- grams also across the same nine countries; and (3) Gaffney, Farrington,
tration, the literature has also begun to explore gender differences in Espelage, and Ttofi (2019) included twenty-four publications published
the topics that individuals who perpetrate cyberbullying choose to use. from 2012 onward in their meta-analysis on cyberbullying program
For example, one study found that in a sample of undergraduates, fe- effectiveness. All three analyses examined studies based on school-aged
males were more likely to be targeted with topics about sexual activity samples and all concluded that programs demonstrated only modest
(e.g., nude photos, etc.), whereas men were more frequently cyber- effects. The meta-analysis conducted by Van Cleemput et al. (2014)
bullied about their skills/talents (e.g., intelligence) and sexual or- found an average effect size for reducing victimization g = 0.135
ientation (Brody & Vangelisti, 2017). Again, these findings not only (n = 9453, k = 6, 95% CI 0.079; 0.190, p < .001), while for perpe-
point to the need for further work exploring gender differences but also tration it was g = 0.065 (n = 6373, k = 6, 95% CI 0.019; 0.112,
should catalyze more in-depth examination of bias-based forms of cy- p < .01). Alternatively, Gaffney et al. (2019) found overall reductions
berbullying. in cyberbullying victimization to range between 14 and 15% and for
cyberbullying perpetration to range from 9 to 15%. These rates are
6. Outcomes modest and are commensurate with the effects gleaned in traditional
bullying programs (Gaffney et al., 2019; Van Cleemput et al., 2014).
Vaillancourt et al. (2017) provide an excellent overview of the un- Regarding program strategies at school, Gaffney et al. (2019) did not
ique effects of cyberbullying—over and above traditional bullying—on explicitly analyze this and Van Cleemput et al. (2014) concluded that
mental wellbeing. The plethora of research reviewed by them indicate most programs did not adopt a whole school approach, but rather fo-
that after controlling for traditional bullying, cyberbullying is asso- cused on modules implemented to address cyberbullying added on to
ciated with: anxiety, depression, suicidal ideation and suicide attempts, their traditional anti-bullying programs. This is unfortunate given the
somatic complaints and compromised physical health, symptoms of large body of literature noting the centrality of a whole school approach
post-traumatic stress disorder (PTSD), and academic difficulties. Re- in bullying prevention (see Ansary, Elias, Greene, & Green, 2015a,
garding intensity of psychopathology, the authors state “a dose-re- 2015b for a review).
sponse effect is commonly found between being cyberbullied and the Given the dearth of holistic programs addressing cyberbullying, I
severity of its consequences—youth who are bullied the most are the examine program strategies that are sensitive to risk and protective
ones who suffer the most” (Vaillancourt et al., 2017, p. 370). factors and that are also context-specific. This perspective aligns with
Similar conclusions have been drawn by others about the ill-effects Swearer and Hymel's (2015) social-ecological diathesis-stress model,
of cyberbullying. In a longitudinal study which controlled for baseline which conceptualizes the individual who bullies in a dynamic interac-
levels of distress, cyberbullying was associated with higher social an- tion with his/her home, school, peer-network, and neighborhood/
xiety, depression, and lower overall wellbeing at one-year follow-up community. Thus, the following section will examine evidence-based
(Fahy et al., 2016). In that study, no long-term effects were found program strategies for parents, schools, bystanders, and social media
among individuals who engaged in cyberbullying perpetration, how- platforms separately.
ever the study was limited in that it did not include externalizing be-
havior dimensions for consideration. Likewise, in a study only con- 7.1. Parents
sidering negative experiences on Facebook, participants who reported
any form of negative interaction, regardless of recency of the incident, Positive parenting dimensions have been found to be a protective
showed elevated depression levels after controlling for baseline de- factor for both cybervictimization and cyberbullying perpetration
pression (Rosenthal, Buka, Marshall, Carey, & Clark, 2016). With regard (Kowalski et al., 2019). Parental supervision of technology is also a
to suicidal ideation, while both traditional bullying and cyberbullying protective factor in cyberbullying perpetration (Zych et al., 2019). This
were found to be associated with higher suicidal ideation, youth who is no surprise as parents are recognized as an important target audience
reported being a victim of both forms were over five times as likely to in traditional bullying prevention (Ansary et al., 2015a; Ansary et al.,
report experiencing suicidal ideation (Hinduja and Patchin, 2019a, b). 2015b), and they may be even more critical agents in cyberbullying
prevention and intervention.
7. Prevention and intervention With regard to monitoring of technology, according to Pew
Research Center (Anderson, 2016), parents may be relatively hands-on
As a discipline, developmental psychopathology requires specific in monitoring their children's technology use. In point of fact, 60% of
criteria in the design of effective prevention and intervention pro- parents say they check their teens' social media profiles, and 48% have
gramming, including (1) theory which provides a foundation from ever looked through their teens' phone calls or texts (Anderson, 2016).
which all strategies are based on; (2) an emphasis on risk and protective And while many parents recognize this important role, they report
factors that have been identified in the empirical literature; (3) pro- lacking the technological knowledge to comprehensively monitor
minence of the various contexts that impact an individual (i.e., home, (Kessel Schneider, Smith, & O'Donnell, 2013). Although online tip
school, etc.) in program design; and (4) empirical evaluation of the sheets are an important source of information for parents, Espelage and
program's effectiveness (Hinshaw, 2013). Accordingly, there are several Hong (2017) caution that these may not be vetted and accordingly
limitations in the programming literature on the issue, namely (1) recommend that parents seek guidance from government agencies or
programs have either been designed as extensions of traditional bul- advocacy organizations that are evidence-based.
lying programs, or a-theoretically (Tanrikulu, 2018); (2) much of the Guidance for parents should include information on prevention
literature focuses on examining factors influencing involvement in cy- (e.g., teaching children digital citizenship) and intervention when cy-
berbullying on a one-context-at-a-time basis (i.e., parental monitoring berbullying happens (e.g., block users who post harmful messages).
or school-based remedies), but seldom together in a holistic framework; Regarding prevention, parents should instruct their children about safe
and (3) program evaluation has been limited due to variations in ICT use, such as (1) not sharing usernames or passwords; (2) not pro-
“duration, theory, sampling, design, and measurement tools” viding personal information in profiles, chat rooms, and other fora; (3)
(Tanrikulu, 2018, p. 84). not responding to threatening messages and to notify an adult im-
Prior to addressing the various contexts for which programming has mediately; and (4) shutting technology off if a threatening message is

5
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

received (National Crime Prevention Council, n.d.). Nurturing re- in place to address cyberbullying (Ansary et al., 2015a; Ansary et al.,
sponsible use of technology also entails instructing youth (1) about 2015b; Espelage & Hong, 2017).
refraining from sending personal or inappropriate photos of oneself; (2)
that a post leaves a permanent footprint that cannot be taken back 7.3. Peers and bystanders
(National Crime Prevention Council, n.d.); (3) to tell an adult without
fear of losing access to their technology; and (4) that consequences will For both cyberbullying targets and perpetrators, positive peer in-
be firmly enforced for engaging in cyberbullying perpetration (see teractions and peer support are protective factors (Kowalski et al.,
Hinduja & Patchin, 2013). With respect to intervention when cyberbul- 2019; Zych et al., 2019). Conversely, peer rejection, lack of prosocial
lying occurs, evidence suggests that engaging the child who bullies in peers and peer norms supporting bullying are risks for cyberbullying
further online communication about the incident exacerbates the pro- perpetration (Kowalski et al., 2019). Allison and Bussey (2016) found
blem (Perren et al., 2012), and accordingly parents should immediately that one of the strongest predictors of cyberbullying bystander inter-
block the potential cyberbully from any further communication. Re- vention is whether or not the target of the bullying is a friend.
porting the attack to the appropriate social media outlet is also a critical Bystanders play a key role in defusing or escalating incidents in both
step. Although parents may be challenged to effectively monitor chil- traditional and cyberbullying domains (Allison & Bussey, 2016). Ac-
dren's ICT use, they can certainly make a difference. cording to Lenhart et al. (2011) 88% of U.S. teens have witnessed cy-
berbullying and of these, 91% reported that they did nothing about it.
7.2. Educators and schools Lack of bystander intervention can be explained by several factors,
namely (a) whether posts occur on large platforms where youth feel
School climate and satisfaction with school are protective factors for that others will likely intervene (diffusion of responsibility); (b) worry
both targets of cyberbullying and individuals who perpetrate cyber- over what others will say; and (c) because of the asynchronous nature of
bullying (Kowalski et al., 2019; Zych et al., 2019). In prior research, cyber-interactions, youth may feel that it is too late to act (Allison &
cyberbullying was characterized as occurring outside of school with Bussey, 2016). According to Allison and Bussey (2016) these char-
negative interactions continuing into the next school day (see Cassidy, acteristics of bystander intervention have been replicated cross-cultu-
Faucher, & Jackson, 2013). More recent trends indicate that the di- rally.
chotomy between technology use at school versus at home is no longer
an important distinction. Adolescents often have access to computers or 7.4. Social media
tablets while at school, and though many schools ban cell phone use,
the reality is that most youth use them during the school day. In a Social media companies must walk the fine line between regulating
similar vein, schools also provide the context within which peers in- free speech (i.e., policing and removing content that may be harmful or
teract socially and since most targets of cyberbullying know the per- offensive), and protecting the rights of users (Milosevic, 2016). Con-
petrator (Whittaker & Kowalski, 2015), schools must play an important sequently, these companies often “…downplay their own responsibility
role in prevention and intervention. Cumulatively, these risks under- for the extent to which technologies may facilitate such behavior…”
score the need for effective and explicit school-based cyberbullying and “they see users as better positioned to understand the context be-
programming. As will be discussed later, laws in all fifty states in the hind their own conflicts” (p. 5175). Accordingly, many social media
U.S. hold schools accountable for preventing, intervening, as well as companies advocate for social reporting or community moderation to
investigating and reporting cyberbullying (U.S. Department of Health address cyberbullying because it is more efficient for the company
and Human Services, 2018). though not necessarily in the best interest of users (Milosevic, 2016).
Fostering a positive school climate is crucial in the prevention of Larger social media companies tend to have a more comprehensive
traditional bullying and cyberbullying (Ansary et al., 2015a; Ansary definition of cyberbullying as well as more sophisticated policies and
et al., 2015b; Espelage & Hong, 2017). Moreover, Espelage and Hong procedures in place to help support users compared to younger com-
(2017) note that with regard to cyberbullying, schools should (a) have panies (Milosevic, 2016). Most social media platforms have mechan-
clear proactive policies, procedures, and practices about internet use isms to prevent and intervene in cyberbullying such as: reporting,
and cyberbullying; (b) actively promote awareness of social-emotional blocking, filtering software, as well as human and automated detection
skills among faculty, staff, and students; (c) promote a positive school systems. Automatic detection through feature engineering (Rosa et al.,
environment; and (d) nurture school-family connections. While these 2019) examines various characteristics of posts (e.g., language, emoti-
are no different than essential elements of effective school-based anti- cons, etc.) to identify instances of cyberbullying. In a review of auto-
bullying programs, an explicit emphasis on bullying in cyberspace is matic cyberbullying detection studies, Rosa et al. (2019) conclude that
critical. Some evidence suggests that cyberbullying is not always ex- current detection systems do not distinguish between cyberaggression
plicitly mentioned in schools' anti-bullying policies (Kessel Schneider and cyberbullying: Those researchers recommend annotator training on
et al., 2013). This is unfortunate in light of research evidence suggesting the proper definition and overall concept of cyberbullying (Rosa et al.,
that youth who report having clear rules about cyberbullying from 2019). Further, automatic detection systems may be less efficient since
school and parents are significantly less likely to report involvement in human moderators can understand nuances in language such as irony
online bullying (Hinduja & Patchin, 2013). or context-specific aggression (Milosevic, 2016).
Other areas where schools can work towards preventing cyberbul- Beyond explicit guidance on intervention, social media companies
lying, is to directly tackle the issue through the school's curriculum in a should do more to prevent cyberbullying. Some prevention efforts em-
developmentally appropriate fashion. The evidence is clear that social ployed by social media platforms include (1) messaging about appro-
emotional character development (SECD) is one of the central columns priate online behavior and a focus on positive instead of negative in-
that effective anti-bullying programs are built on (Ansary et al., 2015a; teractions (Barlett, DeWitt, Maronna, & Johnson, 2018; Kessel
Ansary et al., 2015b). The cyberbullying prevention literature is rife Schneider et al., 2013); (2) notifications and delays that are designed to
with synonyms for socially responsible behavior (e.g., prosocial beha- promote self-reflection and prosocial behaviors (Rosa et al., 2019), such
vior, kindness, etc.) though many researchers do not specifically refer to as proactive screening, which can identify potentially harmful posts and
these as social-emotional skills. Just as it is in traditional bullying prompt the user with messages such as “Are you sure you want to post
prevention, SECD should play a prominent role in cyberbullying pre- this”? or “Say something kind” (see Milosevic, 2016, p. 5172); (3) re-
vention. Another critical element in addressing cyberbullying in schools quire users' to reveal their identities since sites that do so report lower
is professional development: Teachers need to be trained to identify, levels of cyberbullying than those that do not (Barlett et al., 2018); and
respond, and report incidents to the necessary channels the school has (4) require users to authenticate their account and emails regularly to

6
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

prevent the use of fake accounts (Barlett et al., 2018). Furthermore, targeted. Additionally, prior victimization is a critical variable that
social media platforms should encourage bystanders to intervene should be present in theoretical models of cyberbullying, given that it
(Barlett et al., 2018) even if by the more commonly seen indirect has been repeatedly identified as a risk factor (Kowalski et al., 2014,
methods of intervention (e.g., rating a post unfavorably or reporting the 2019; Waasdorp & Bradshaw, 2015; see also Wong et al., 2018). Such
perpetrator) as opposed to direct intervention (explicit correspondence insights necessitate the refinement of existing models to account for
about the incident) (Barlett et al., 2018). these complexities and also point to the need for the creation of more
complex models that comprehensively capture the problem. Progress in
7.5. Health care providers the development of holistic theoretical models that are tested among
diverse samples (e.g., heterogeneity in age, race, ethnicity, sexual or-
Since reporting of cyberbullying involvement is extremely low ientation, disability, etc.) and using various methodologies is needed to
(Cassidy et al., 2013), medical doctors and mental health practitioners undergird progress in the scholarly and applied realms.
working with adolescents may play important roles in detecting it. There are no prospective longitudinal studies published regarding
These health professionals can ask questions about cyberbullying (ei- risk and protective factors and thus the findings are mainly related to
ther directly or by survey) at intake and encourage youth to speak with cross-sectional research (Zych et al., 2019). Furthermore, more elabo-
parents about limiting technology (Espelage & Hong, 2017). For mental rate research designs are needed to adequately capture the dynamic
health practitioners, the link between cybervictimization and myriad interactions between individual, familial, peer, school, and community
forms of long-term psychopathology are well documented (Vaillancourt levels in the exploration of risk and protective factors. For example,
et al., 2017). Furthermore, the important role of mental health practi- Savage and Tokunaga (2017) concluded that cyberbullying perpetra-
tioners is underscored by evidence (that requires replication) sug- tion was explained by a complex relationship of social skills, internet
gesting that even incidents that happened in the past are associated self-efficacy, and verbal aggressiveness. As such, prospective long-
with present-day dysfunction (Rosenthal et al., 2016). itudinal analyses that examine these dynamic interactions is necessary
and path analysis, structural equation modeling, and person-based
7.6. Law analysis will provide useful insights into the complexity of cyberbul-
lying.
Although all fifty states in the U.S. have laws addressing cyberbul- Study of group differences in the risks for cyberbullying victimiza-
lying, there is considerable variability in their protections and the U.S. tion and perpetration has just begun. More work is required to further
Department of Education has provided federal guidance on the issue explain the mixed evidence about gender differences, which can only
since 2010, in an effort to promulgate a basic standard for protections occur by exploring the differences in motivations for technology use,
(U.S. Department of Health and Human Services, 2018). Given varia- the salience of the disinhibition effect, coping with prior victimization,
bility across states, Hinduja and Patchin, (2015b) outline six re- among other factors between males and females (Wong et al., 2018).
commendations for laws addressing effective anti-cyberbullying po- Moreover, scant evidence on bias-based forms of cyberbullying exist
licies. These include (1) a specific definition of harassment, (Kann et al., 2018; Kowalski et al., 2019) and these suggest groups of
intimidation, and bullying with explicit mention of various technolo- understudied populations that are particularly vulnerable. In spite of
gies; (2) sanctions that increase in severity based on repetition; (3) clear evidence regarding disproportionately higher rates of traditional bul-
policies for reporting; (4) clear policies on investigating; (5) explicit lying of Muslim, Jewish, and Sikh youth (Ansary, 2018), there are no
mention of activities occurring off-school grounds that constitute cy- peer-reviewed studies addressing cyberbullying of religious minorities.
berbullying; and (6) policies and procedures for preventing cyberbul- While it may not be the case that these youth are explicitly targeted
lying. These are nearly identical to best-practices for school-based with reference to their minority identity (e.g., Muslim youth being
programming to address traditional bullying (Ansary et al., 2015a, called a terrorist), they are likely to be, more broadly, at elevated risk
2015b). These laws hold educators and administrators responsible for for all forms of cyberbullying.
effectively intervening, investigating, and reporting, as well as for the Evidence-based prevention and intervention efforts will benefit
implementation of effective cyberbullying prevention programming. from work that addresses the existing limitations in the field. At this
time, cyberbullying programs have limited or no theoretical basis, are
8. Limitations and future directions often considered as an add-on module to traditional bullying programs,
and have not been evaluated in meaningful ways to determine effec-
While it is encouraging to see an explosion in the empirical in- tiveness (Tanrikulu, 2018; Van Cleemput et al., 2014). Strides are ne-
vestigation of cyberbullying, significant limitations in the field persist cessary to build-on the growing body of research pointing to specific
and more scholarship is required. The most general limitations in the risk and protective factors that are context-specific in order to design
existing literature surround the difficulties of a definition, inconsistent more effective programs. Furthermore, there should be an urgent call
ways of measuring cyberbullying, and limited theories holistically ex- for policy makers to develop restrictions on social media applications
plaining the issue. While progress has occurred in terms of a definition, that are advertised to younger users that will ensure better prevention
greater work is needed on the construction of reliable and valid mea- and intervention of cyberbullying.
surement of cyberbullying that effectively discriminates it from cyber-
aggression. Doing so will foment progress in terms of strengthening the
internal validity of studies examining cyberbullying, as well as in es- 9. Conclusion
tablishing accurate prevalence rates.
Regarding theoretical models explaining cyberbullying from a psy- If the next ten years of research mirrors the exponential growth in
chological perspective, with the exception of Swearer and Hymel's the cyberbullying literature that we have seen in the past ten years, the
(2015) social-ecological diathesis-stress model, the existing models are field should be equipped with well-designed effective prevention and
too simplistic and do not adequately account for the existing risk and intervention programming. Moreover, progress must address the em-
protective factors that have been empirically identified. Moreover, in pirical evaluation and tailoring of prevention and intervention pro-
light of recent evidence suggesting gender differences in cyberbullying grams to address the needs of our most vulnerable youth, namely, ra-
perpetration (Kowalski et al., 2019; Wong et al., 2018), theoretical cial/ethnic and religious minorities, LGBTQI individuals, and persons
models will need to explicitly account for gender. Inclusion of variables with varying abilities. Empirically informed prevention strategies that
assessing other minority identities (i.e., racial, ethnic, religious, sexual, address the gamut of an adolescent's life will eventually offer the pro-
etc.) is also necessary as these individuals are at elevated risk of being tection that every child deserves.

7
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

Acknowledgements data/yrbs/pdf/2017/ss6708.pdf.
Kessel Schneider, S., Smith, E., & O’Donnell, L. (2013, November). Social media and cy-
berbullying: Implementation of school-based prevention efforts and implications for social
I am deeply grateful to Alanna D'Avanzo and Syrah Liles for their media approaches. Education Development Center. Retrieved on June 14, 2019 from
valuable feedback which have improved the manuscript greatly. http://www.promoteprevent.org/social-media-and-cyberbullying-implementation-
school-based-prevention-efforts-and-implications.
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in
References the digital age: A critical review and meta-analysis of cyberbullying research among
youth. Psychological Bulletin, 140(4), 1073–1137. https://doi.org/10.1037/
Allison, K. R., & Bussey, K. (2016). Cyber-bystanding in context: A review of the literature a0035618.
on witnesses’ responses to cyberbullying. Children and Youth Services Review, 65, Kowalski, R. M., Limber, S. P., & McCord, A. (2019). A developmental approach to cy-
183–194. https://doi.org/10.1016/j.childyouth.2016.03.026. berbullying: Prevalence and protective factors. Aggression and Violent Behavior, 45,
Anderson, C. A., & Bushman, B. J. (2002). Human aggression. Annual Review of 20–32. https://doi.org/10.1016/j.avb.2018.02.009.
Psychology, 53, 27–51. https://doi.org/10.1146/annurev.psych.53.100901.135231. Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., & Rainie, L. (2011). Teens,
Anderson, M., & Jiang, J. (2018, May 31). Teens, social media & technology 2018. kindness and cruelty on social network sites. Washington, D.C: Pew Research Center.
Retrieved on May 19, 2019 from https://www.pewinternet.org/2018/05/31/teens- Milosevic, T. (2016). Social media companies’ cyberbullying policies. International Journal
social-media-technology-2018/. of Communication, 10, 5164–5185.
Anderson, M. A. (2016). Parents, teens and digital monitoring. Washington, D.C: Pew National Crime Prevention Council. (n.d.). What parents can do about cyberbullying.
Research Center. January 7. Retrieved on June 14, 2019 from https://www. Retrieved on June 17, 2019 from https://www.ncpc.org/resources/cyberbullying/
pewinternet.org/2016/01/07/parents-teens-and-digital-monitoring/. what-parents-can-do-about-cyberbullying/.
Ansary, N. S. (2018). Religious-based bullying: Insights on research and evidence-based best Olweus, D. (1999). Sweden. In P. K. Smith, Y. Morita, J. Junger-Tas, D. Olweus, R.
practices from the National Interfaith Anti-Bullying Summit (2017). Washington, D.C: Catalano, & P. Slee (Eds.). The nature of school bullying: A cross-national perspective (pp.
Institute for Social Policy and Understanding. Retrieved on June 14, 2019 from 7–27). London: Routledge.
https://www.ispu.org/religious-based-bullying-insights-on-research-and-evidence- Olweus, D., & Limber, S. (2018). Some problems with cyberbullying research. Current
based-best-practices-from-the-national-interfaith-anti-bullying-summit/. Opinion in Psychology, 19, 139–143. https://doi.org/10.1016/j.copsyc.2017.04.012.
Ansary, N. S., Elias, M., Greene, M., & Green, S. (2015a). Guidance for schools selecting Patchin, J. W., & Hinduja, S. (2012). Cyberbullying: An update and synthesis of the re-
antibullying approaches: Translating evidence-based strategies to contemporary im- search. In J. W. Patchin, & S. Hinduja (Eds.). Cyberbullying prevention and response:
plementation realities. Educational Researcher, 44(1), 27–36. https://doi.org/10. Expert perspectives (pp. 13–35). New York, NY: Routledge.
3102/0013189X14567534. Perren, S., Corcoran, L., Cowie, H., Dehue, F., Garcia, D., Mc Guckin, C., et al. (2012).
Ansary, N. S., Elias, M., Greene, M., & Green, S. (2015b). Best practices to address (or Coping with cyberbullying: A systematic literature review. Final report of the COST IS
reduce) bullying in schools. Phi Delta Kappan, 97, 30–35. https://doi.org/10.1177/ 0801 working group 5 (published online).
0031721715610088. Peter, I.-K., & Petermann, F. (2018). Cyberbullying: A concept analysis of defining at-
Barlett, C. P. (2017). From theory to practice: Cyberbullying theory and its application to tributes and additional influencing factors. Computers in Human Behavior, 86,
intervention. Computers in Human Behavior, 72, 269–275. https://doi.org/10.1016/j. 350–366. https://doi.org/10.1016/j.chb.2018.05.013.
chb.2017.02.060. Pharo, H., Sim, C., Graham, M., Gross, J., & Hayne, H. (2011). Risky business: Executive
Barlett, C. P., DeWitt, C.C., Maronna, B., & Johnson, K. (2018). Social media use as a tool function, personality, and reckless behavior during adolescence and emerging
to facilitate or reduce cyberbullying perpetration: A review focusing on anonymous adulthood. Behavioral Neuroscience, 125(6), 970–978. https://doi.org/10.1037/
and nonanymous social media platforms. Violence and Gender, 5(3), 147–152. doi. a0025768.
org/https://doi.org/10.1089/vio.2017.0057. Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P. C., Carvalho, J. P., Oliveira, S., ... Trancoso,
Barlett, C. P., Madison, C. S., Heath, J. B., & DeWitt, C. C. (2019). Please browse re- I. (2019). Automatic cyberbullying detection: A systematic review. Computers in
sponsibly: A correlational examination of technology access and time spent online in Human Behavior, 93, 333–345. https://doi.org/10.1016/j.chb.2018.12.021.
the Barlett Gentile Cyberbullying model. Computers in Human Behavior, 92, 250–255. Rosenthal, S. R., Buka, S. L., Marshall, B. D. L., Carey, K. B., & Clark, M. A. (2016).
https://doi.org/10.1016/j.chb.2018.11.013. Negative experiences on Facebook and depressive symptoms among young adults.
Brody, N., & Vangelisti, A. L. (2017). Cyberbullying: Topics, strategies, and sex differ- Journal of Adolescent Health, 59(5), 510–516. https://doi.org/10.1016/j.jadohealth.
ences. Computers in Human Behavior, 75, 739–748. https://doi.org/10.1016/j.chb. 2016.06.023.
2017.06.020. Savage, M. W., & Tokunaga, R. S. (2017). Moving toward a theory: Testing an integrated
Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A com- model of cyberbullying perpetration, aggression, social skills, and internet self-effi-
prehensive review of current international research and its implications and appli- cacy. Computers in Human Behavior, 71, 353–361. https://doi.org/10.1016/j.chb.
cation to policy and practice. School Psychology International, 34(6), 575–612. https:// 2017.02.016.
doi.org/10.1177/0143034313479697. Selkie, E. M., Fales, J. L., & Moreno, M. A. (2016). Cyberbullying prevalence among US
Dehue, F. (2013). Cyberbullying research: New perspectives and alternative methodolo- middle and high school–aged adolescents: A systematic review and quality assess-
gies. Introduction to the special issue. Journal of Community & Applied Psychology, 23, ment. Journal of Adolescent Health, 58(2), 125–133. https://doi.org/10.1016/j.
1–6. https://doi.org/10.1002/casp.2139. jadohealth.2015.09.026.
Espelage, D. L., & Hong, J. S. (2017). Cyberbullying prevention and intervention efforts: Slotter, E. B., & Finkel, E. J. (2011). I3 theory: Instigating, impelling, and inhibiting
Current knowledge and future directions. The Canadian Journal of Psychiatry, 62(6), factors in aggression. In P. R. Shaver, & M. Mikulincer (Eds.). Herzilya series on per-
374–380. https://doi.org/10.1177/0706743716684793. sonality and social psychology. Human aggression and violence: Causes, manifestations,
Fahy, A., Stansfeld, S. A., Smuk, M., Smith, N., Cummins, S., & Clark, S. (2016). and consequences (pp. 35–52). Washington, DC, US: American Psychological
Longitudinal associations between cyberbullying involvement and adolescent mental Association. https://doi.org/10.1037/12346-002.
health. Journal of Adolescent Health, 59(5), 502–509. https://doi.org/10.1016/j. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
jadohealth.2016.06.006. Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Gaffney, H., Farrington, D. P., Espelage, D. L., & Ttofi, M. M. (2019). Are cyberbullying Psychology and Psychiatry, 49, 376–385. https://doi.org/10.1111/j.1469-7610.
intervention and prevention programs effective? A systematic and meta-analytical (2007).01846.x.
review. Aggression and Violent Behavior, 45, 134–153. https://doi.org/10.1016/j.avb. Smith-Spark, L. (2013, August 9). Hanna Smith suicide fuels calls for action on Ask.fm
2018.07.002. cyberbullying. Retrieved on June 14, 2019 from http://www.cnn.com/2013/08/07/
Hinduja, S., & Patchin, J. W Cyberbullying Facts. Cyberbullying Research Center. world/europe/uk-social-media-bullying/.
Retrieved on June 14, 2019 from https://cyberbullying.org/facts. Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3),
Hinduja, S., & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among 321–326. https://doi.org/10.1089/1094931041291295.
middle and high school students. Journal of Youth & Adolescence, 42, 711–722. Swearer, S. M., & Hymel, S. (2015). Understanding the psychology of bullying: Moving
https://doi.org/10.1007/s10964-012-9902-4. toward a social-ecological diathesis-stress model. American Psychologist, 70(4),
Hinduja, S., & Patchin, J. W. (2015a). Bullying beyond the schoolyard: Preventing and re- 344–353. https://doi.org/10.1037/a0038929.
sponding to Cyberbullying (2nd ed.). Thousand Oaks, CA: Sage Publications. Tanrikulu, I. (2018). Cyberbullying prevention and intervention programs in schools: A
Hinduja, S., & Patchin, J. W. (2015b). Cyberbullying legislation and case law: systematic review. School Psychology International, 39(1), 74–91. https://doi.org/10.
Implications for school policy and practice. Retrieved on June 14, 2019 from 1177/0143034317745721.
Cyberbullying Research Centerhttps://cyberbullying.org/cyberbullying-legal-issues. United States Department of Health and Human Services (2018, January). Laws, policies
pdf. and regulations. Retrieved on June 14, 2019 from https://www.stopbullying.gov/
Hinduja, S., & Patchin, J. W. (2019a). Cyberbullying facts. Retrieved on June 14, 2019 laws/index.html.
from Cyberbullying Research Centerhttps://cyberbullying.org/facts. Vaillancourt, T., Faris, R., & Mishna, F. (2017). Cyberbullying in children and youth:
Hinduja, S., & Patchin, J. W. (2019b). Connecting adolescent suicide to the severity of Implications for health and clinical practice. Canadian Journal of Psychiatry, 62(6),
bullying and cyberbullying. Journal of School Violence, 18(3), 333–346. https://doi. 368–373. https://doi.org/10.1177/0706743716684791.
org/10.1080/15388220.2018.1492417. Valencia, N. (2014, March 10). Yik Yak chat app stirring up trouble in high schools.
Hinshaw, S. P. (2013). Developmental psychopathology as a scientific discipline: Retrieved June 14, 2019 from http://www.cnn.com/2014/03/07/tech/yik-yak-app-
Rationale, principles, and advances. In T. P. Beauchaine, & S. P. Hinshaw (Eds.). Child high-school-problems/.
and adolescent psychopathology (pp. 3–27). (2nd ed.). New York: Wiley. Van Cleemput, K., DeSmet, A., Vandebosch, H., Bastiaensens, S., Poels, K., & De
Kann, L., McManus, T., Harris, W. A., et al. (2018). Youth Risk Behavior Bourdeaudhuij, I. (2014). A systematic review and meta-analysis of the efficacy of
Surveillance—United States, 2017. Surveillance summary 2017:67 (no. 8). [inclusive cyberbullying prevention programs. Paper presented at ‘Etmaal van de
pp. 17-18]. Retrieved on June 14, 2019 from https://www.cdc.gov/healthyyouth/ Communicatiewetenschap’, Wageningen, NL Feb 3rd-4th.

8
N.S. Ansary Aggression and Violent Behavior 50 (2020) 101343

Vandebosch, H., & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of Violence, 14(1), 11–29. https://doi.org/10.1080/15388220.2014.949377.
bullies and victims. New Media Society, 11, 1349–1371. https://doi.org/10.1177/ Wong, R. Y. M., Cheung, C. L. K., & Xiao, B. (2018). Does gender matter in cyberbullying
1461444809341263. perpetration? An empirical investigation. Computers in Human Behavior, 79, 247–257.
Waasdorp, T. E., & Bradshaw, C. P. (2015). The overlap between cyberbullying and tra- https://doi.org/10.1016/j.chb.2017.10.022.
ditional bullying. Journal of Adolescent Health, 56(5), 483–488. https://doi.org/10. World Health Organization [WHO] (2013). Definition of key terms. Retrieved from
1016/j.jadohealth.2014.12.002. https://www.who.int/hiv/pub/guidelines/arv2013/intro/keyterms/en/.
Wallace, K. (2015, January 9). Parents, beware of bullying on sites you've never seen. Zych, I., Farrington, D., & Ttofi, M. M. (2019). Bullying and cyberbullying: Protective
Retrieved June 14, 2019 from http://www.cnn.com/2013/10/10/living/parents- factors and effective interventions. Aggression and Violent Behavior, 45, 4–19. https://
new-apps-bullying/. doi.org/10.1016/j.avb.2018.06.008.
Whittaker, E., & Kowalski, R. (2015). Cyberbullying via social media. Journal of School

You might also like